Previously, Goyal, Jain, Koppula and Sahai [Cryptology ePrint Archive, 2013] constructed a public-key functional encryption scheme for any family of randomized functionalities based on indistinguishability obfuscation.
One of the key insights underlying our work is that, in the private-key setting, a sufficiently expressive functional encryption scheme may be appropriately utilized for implementing proof techniques that were so far implemented based on obfuscation assumptions (such as the punctured programming technique of Sahai and Waters [STOC 2014]). We view this as a contribution of independent interest that may be found useful in other settings as well.
Category / Keywords: foundations / functional encryption, randomized functionalities, punctured programming, Date: received 21 Oct 2014, last revised 22 Oct 2014 Contact author: eylony at weizmann ac il Available format(s): PDF | BibTeX Citation Version: 20141022:205619 (All versions of this report) Discussion forum: Show discussion | Start new discussion